complianceCyberSecuritypentestzero-dayvulnerabilityHIPAAescalationresilienceEDRpacketBECIDSpassphraserootkitOSantiviruswormPIIspamincidentnetworkbusinesscontinuitysocialengineeringIPScyberattackransomwarephishingIPAPTfirewalldefenseevasionpasswordDDoSbotnetriskassessmentFTPspoofingProofpointincidentresponsespywareIoTexploitvirusSyssecAdminDarkWebhackeradminencryptionWISPriskvishingcryptographyCIAtriadCyberDefensetrainingmalwareVPNsecurityawarenessinsiderthreatbugMFAIOCDefense-in-depthintegritybreachsecuritypolicyavailabilityidentitytheftSecurityOperationsconfidentialitysmishingPHIcomplianceCyberSecuritypentestzero-dayvulnerabilityHIPAAescalationresilienceEDRpacketBECIDSpassphraserootkitOSantiviruswormPIIspamincidentnetworkbusinesscontinuitysocialengineeringIPScyberattackransomwarephishingIPAPTfirewalldefenseevasionpasswordDDoSbotnetriskassessmentFTPspoofingProofpointincidentresponsespywareIoTexploitvirusSyssecAdminDarkWebhackeradminencryptionWISPriskvishingcryptographyCIAtriadCyberDefensetrainingmalwareVPNsecurityawarenessinsiderthreatbugMFAIOCDefense-in-depthintegritybreachsecuritypolicyavailabilityidentitytheftSecurityOperationsconfidentialitysmishingPHI

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
  1. compliance
  2. Cyber Security
  3. pentest
  4. zero-day
  5. vulnerability
  6. HIPAA
  7. escalation
  8. resilience
  9. EDR
  10. packet
  11. BEC
  12. IDS
  13. passphrase
  14. rootkit
  15. OS
  16. antivirus
  17. worm
  18. PII
  19. spam
  20. incident
  21. network
  22. business continuity
  23. social engineering
  24. IPS
  25. cyber attack
  26. ransomware
  27. phishing
  28. IP
  29. APT
  30. firewall
  31. defense evasion
  32. password
  33. DDoS
  34. botnet
  35. risk assessment
  36. FTP
  37. spoofing
  38. Proofpoint
  39. incident response
  40. spyware
  41. IoT
  42. exploit
  43. virus
  44. SyssecAdmin
  45. Dark Web
  46. hacker
  47. admin
  48. encryption
  49. WISP
  50. risk
  51. vishing
  52. cryptography
  53. CIA triad
  54. Cyber Defense
  55. training
  56. malware
  57. VPN
  58. security awareness
  59. insider threat
  60. bug
  61. MFA
  62. IOC
  63. Defense-in-depth
  64. integrity
  65. breach
  66. security policy
  67. availability
  68. identity theft
  69. Security Operations
  70. confidentiality
  71. smishing
  72. PHI